Archive: phishing

Enabling and Using Advanced Features in Microsoft Teams David Branscome, Partner Technical Architect at Microsoft, and expert at all things Teams joined us again this week to show us how to enable and use some of the cooler advanced features…

Windows Defender Advanced Threat Protection Demo and Walkthrough In this Tech Talk, Andrea Fisher, Global Cybersecurity Specialist at Microsoft, took us through a great demonstration of new (and upcoming) features in Windows Defender Advanced Threat Protection (ATP), as well as…

Windows Server 2008 + SQL Server 2008 End of Support On January 14th 2020, Windows Server 2008 R1 and R2 reach end of support. SQL Server 2008 reaches end of support on July 9th, 2019. In this week’s Tech Talk…

Automating Security with Cloud App Security and Microsoft Flow In this Tech Talk, we are once again joined by Microsoft Technical Solutions Architect David Branscome, who discusses how to automate security using Cloud App Security and Flow. David first joined…

Intune for Mobile Device Management (MDM) and Mobile Application Management (MAM) Using Microsoft’s Intune for Mobile Device management is a easy way to enable your mobile workforce while still maintaining control of your company data. Managing the mobile workforce is…

Saving Money in Azure Saving money in Azure is as simple as getting rid of whitespace. You pay for CPU under-utilization in your virtual machines day in and day out. Over a year an over-powered SQL server can cost you…

Stopping Spoofing Stopping spoofing before it gets to your users becomes more important every day. Phishing is still the most common source of attacks, including malware, BEC scams, and ransomware. Providing defenses to stop spoofed and phishing emails from reaching…

Using Azure DevOps for IT Management DevOps is generally talked about in terms of software development, where it is used to define and create processes to automate the infrastructure of building, continuous testing and deployment. However, even if you are…

Microsoft 365 Advanced Threat Protection – Phishing Attack Simulator Phishing attacks are the most common method of credential theft, with a low barrier to entry (You don’t need to know much more than how to make a web page and…